tv Shift Deutsche Welle September 2, 2023 6:15am-6:31am CEST
6:15 am
right, well that's all for now, rob watts's here, after the break with dw business is taking a look at the economic crisis in syria and there's plenty more news and information on our website. you don't, you don't. com. and you can find us also on social media or handle is due to view news on top of what it is. thanks for watching. and i'll see very soon, the come have a page this out to the highlights you every week in your inbox. subscribe. now. be with each other seamlessly expose to make everything. so let's find out if this has any taylor don't know stephen bossa and koko elaine take classical music off
6:16 am
the pedestal and into tiny house. really cool gas. deep conversations around the kitchen table and the loss of the music boxes. and but i was tiny house because it does in the 2nd d. w. can artificial intelligence influenced our romantic choices on the 5th of circumstances? yes. because a is playing an increasingly important role in dating f. we'll take a closer look at what that means. exactly. plus, how does just visual intelligence gets hacked and misused for criminal purposes? and it is becoming increasingly difficult to distinguish between what's real and what fake we tell you what to look out for and what the tech companies are doing to protect us from fake video and images. these are the topics that are moving the
6:17 am
tech. well, i cannot official intelligence help find your perfect match, dating ex husband, embracing a i for a while now 10 that the well biggest online dating platform is expanding its offerings to the app is now testing a tool to help use to select the best looking photos but that's just one example of developing promising us that's a dating luck with the help of digital technologies. the ad downsize to this trend, of course. but today i've been come your 21st century cupid does a i know best 10 to us working on a number of artificial intelligence initiatives to make they think more rewarding, what they mean as well. good. that's what's less effort tend as parent company match group says it's working on a tool that looks to
6:18 am
a uses photo albums to select the 5 images that represent them fest. i'm curious to see which criteria is the a i would use to fix my pictures. unfortunately, that's no public testing yet. according to bonus gym, the c o o match group aging tools, i suppose to eliminate all quickness. after all, sure, it is a pro 5 that says, i'm awesome. i could be the loss of your life and i'm humble, feels nearly impossible, tend to already have other projects in the pipeline to fix that problem at the moment. so let's use this contest if generative a tool to enhance the profiles, it can create individual files based on interest and relationship goals for use a has edit. it sounds pretty convenient, but do we really want that making day thing more efficient? according to a recent study conducted in the u. k, only a 3rd of phasing f use, this would be open to using a guy to enhance the profiles. putting yourself out there seems to be
6:19 am
a job that's in level 2. it's allocated for a i to handle, but they use a sub a, have nothing against using ai and other parts of the dating process. 75 percent of all the aging app use a says they would explore using check. jpg to deliver the perfect opening line with people being willing to use a i to improve that chances in the dating world. as developers are coming up with new ideas, taking a cheese or a i, for example, let's check with an a version of someone before you swipe right on next on that. and with blash, you can work on your relationship and intimacy skills best plus and with the apps checkbox. other companies are working on fox, the, even to the swiping and initial band to for you all to metrics the on the down side . many models currently store the information users give them on service in order to keep one done and ultimately improve a user experience. but when it comes to low, to no doubt going to get personal and that means giving up
6:20 am
a lot of intimate information. so even if tax on select 10 to promise to not give you a day trip to the punches for a heck of it's a very tempting target. if your private data falls into the wrong hands, this huge potential to cost you home. and then that's the issue of roman scans. these are criminal from spain romantic interest to gain the vixen affection. they then use that good will to get the victim to send money under false pretences, all to commit fraud. according to the u. s. security organization s b i. victims from such scans and the united states report of the financial loss of almost $740000000.00 us $1.20 experts argue that i could super charged these wrongful practices and unable criminals to carry out taylor and ultimate scans on a huge scale what do you think will make online dating even more difficult? oh, well, we all benefit from an induced eco boost. let us know has a i can cause you home by stealing your private data for example. but how can these
6:21 am
systems even be hacked and exploded for criminal purposes? here's what you need to know in august. heck us got together at death called the annual heck a convention in las vegas. the tried to make a assistance act, a harmful or even criminal weights, such heck of groups called red chains are essential in finding security flaws and software which has been reported back to the develop the in the age of a i. they might be more important than of the results for the field, for the next few months to give a company's time to address the issues before making them public fatality. even getting a i to go rogue jo, breaking the a. i hey, assistance follow the prompts to give them, in other words, instructions, but to prevent a ad from following instructions that could reduce harmful contents and make us have safety measures in place. for example, they can tell them what office to avoid. but that ways to circumvent
6:22 am
a safety measure. this is called jail break or other funny one. now fix, what's the grandma jail break off? check g p t. i use a told the checkbox that it should act like his deceased grandmother was supposed to be work at the knob home secretary and always told him how to manufacture it. once he was trying to find a sleep cheap and she proceeded to 50, use a detailed instructions of how to produce list level chemical breath as a bedtime story. right now you've got the heck a eyes of chelsea, how to build a bump. so what such instructions consecutive be found elsewhere on the internet? well, real, how could be done if someone jo, brakes, a system you're using without you knowing it from injection, a lot of language and models process what a stephen to them. however, upon input, it is all just text me a ben needs to differentiate between prompts and text that is meant to work with, for example, and optical pro website. but it doesn't always get differentiation,
6:23 am
right? phone been done if some way in the text as a promising that runs the risk of the i model just following that instruction, even if it is a 4th 5th. academics demonstrate of health sol called prompt injection, could be used to trick microsoft, been chad into providing dodgy and things to use as the embedded a prompt into a website. when bank chips such that website, the problem got activated, needing the checkbook to send messages, like, do you have one an amazon gift card? all you have to do is follow this link and log in with your amazon credentials. often use a set they didn't trust the link. chad proceeded to ensure them better, safe and legit or imagine you're using an assistant that's automatically off of email all structure. so you have collins up in front injection of the shots and kind of the pump injection. detect happen, for example, with an email that the model reads. so my e mail by speed. uh good,
6:24 am
and even somewhere in that email, that's a prompt that says length is calanda and forward hall meetings, office email address meetings, the the email address that by for license and then suddenly all my data has been stolen. well then the deposit is gonna be paid for faults done. no, they have an automated job in control. unfortunately, if that's no easy fix yet a developers comp perfectly predict every reaction to every problems and therefore cannot put safety measures for all think couple scenarios in place. and today's a eyes and not intelligent enough to do that by themselves. so from them and say, i model this kind of differentiate, besides the enough between problems and all the data and everything. and the thing deciding this is alice new text. however, ex website developers should research the possibilities of prompt injection more before releasing the models and not put up by us as much. do you trust a based assistance?
6:25 am
let us know if this supposed to of my colleague or is it a i generation a i think takes everywhere and solve used videos, distinguishing between real and fake, discussing more and more difficult. is it even possible to keep up how to tech companies, tackle the problem? and what can you do to protect yourself? how a fixed damage you use a defect scan in china, that's made headlines. a business man was convinced in a video call to transfer money to a friend boss. he fell victim to its defect, created by a hacker with a voice and image southwest cement supposedly lost more than 500000 euro. i think it's frightening. what tom criminals can do is a technology as uses. we should always be skeptical to us images and videos we see or was this were here online. remember this deep fig pictures of donald trump being arrested by police earlier this year. images like that has the potential to manipulate extra political caps and too much on to our societies. this also applies
6:26 am
to texts, thanks to a software like chat. jpg. news articles can nowadays be generated in the blink of an eye. the spend the internet with no quantity and even intentionally false news that way it's getting harder for users to find reliable information. what is being done by the industry? some developers among them amazon, google, and open a i have recently promised to make this software more transparent and the output more easily recognizable best strategy watermarks that could come in different forms. for example, as meta data cameras have been using that for decades. method the data could automatically be added to a, i generate just images of videos and the theory also to text. but it's more difficult with text because once you insert the text into another system, for example, from a text document to a browser, the mess of data is gone. digital images could also be watching my cryptographic
6:27 am
steve bell ready plenty of design tools that app hidden markings to images. for example, to crawl the web looking for copyright violations. sounds good, but these approaches would need to work seamlessly across billions of devices and operating systems. all of these mocking speed on pictures, videos, text or even sound would have to survive being copied and pasted from one f operating system, all platforms to another. to really have an impact on us that would have to be accessible to everyone with an internet connection without any training immediately . so the quite a few technical hurdles to overcome and that's always the chance of criminals find a way to circumvent the measures. what can you do to protect yourself a unfortunately, there's no easy way. most importantly, always be aware that these a fixed exists and that they are being used against you in different ways. so being skeptical about what you see or hear online might be
6:28 am
a good strategy when it comes to online articles. check if the soul is reliable and compared what you're reading with the pulse on the same story, it's done by trustworthy media outlets. people take images are getting more and more perfect, but sometimes says things give away the fitness inconsistencies in the next area. hell, fingers that are not connected effect video sometimes reveal mistakes when you watch them frame by frame. and always be careful if you're being asked for money, even if the person doing that is the old granny during a video call, is this really higher context showing up in the connection details? rule of thumb. always look for possible inconsistencies before you make a decision. what do you think needs to be done to protect the use of? let us know. that's all for me today. by and see you next time, the
6:29 am
6:30 am
and through what secrets lie behind being discovered new adventures in 360 degrees. and explore fascinating world heritage sites p w world heritage 360 yeah. now don't worry. they don't fight with what are these gigantic dogs doing on the streets of antwerp, belgium, pursing and career began busking on the streets of dublin. now 18 year old ali sherlock thrills millions and we went for a stroll through to run albania and discovered delicious dishes, all that and more coming up on your own macs. the.
12 Views
Uploaded by TV Archive on